Hide filtersShow filters × Close ArticlesAprile 6, 2023Celebrating two years of HN Securityby Marco Ivaldi ArticlesExploitsFebbraio 27, 2023Abusing Maven’s pom.xmlby Gianluca Baldi ExploitsVulnerabilitiesGennaio 18, 2023Nothing new under the Sun – Discovering and exploiting a CDE bug chainby Marco Ivaldi ArticlesDicembre 21, 2022A journey into IoT – Unknown Chinese alarm – Part 4 – Internal communicationsby Federico Dotta ToolsNovembre 22, 2022Burp Suite and Protobufby Federico Dotta ToolsOttobre 12, 2022Semgrep rules for Kotlin security assessmentby Federico Dotta ArticlesExploitsSettembre 7, 2022Groovy Template Engine Exploitation – Notes from a real case scenarioby Gianluca Baldi ExploitsArticlesVulnerabilitiesAgosto 22, 2022Useless path traversals in Zyxel admin interface (CVE-2022-2030)by Maurizio Agazzini ArticlesAgosto 5, 2022A journey into IoT – Unknown Chinese alarm – Part 3 – Radio communicationsby Federico Dotta